ABCDEFHIJKLMNOPQRSTUVWXYZ
6
Section HeadingControl HeadingOriginal IDQuestion TextAnswerNotes/Comment
7
Security Certifications1Which of the following is your company compliant with?
8
1.1Please upload the document, if applicable and appropriate
9
2Is there an information security management program that has been approved by management, communicated to appropriate constituents and an owner to maintain and review the program?
10
2.1Does it include a risk management program? Please explain the risk assessment methodology followed in your organization.
11
2.1.1Has a risk assessment been conducted during the last 12 months? Are findings tracked and remedied?
12
3Do you have a third party/vendor management program in place?
13
3.1Does it include risk management and ongoing oversight?
14
3.1.1Please upload the document, if applicable and appropriate
15
4Do you require third parties to sign Non-Disclosure Agreements (NDA)?
16
4.1Please upload the document, if applicable and appropriate
17
5Do you require third parties to sign Service Level Agreement (SLA)?
18
5.1Please upload the document, if applicable and appropriate
19
Information Security Policy6Please select all topics covered by company policies
20
6.1Please upload all relevant policies for review. The [Your company] Information Security team may reach out to you for further discussion..
21
7Are the policies reviewed and approved at least annually?
22
8Is there an information security function/personnel responsible for security initiatives?
23
9Is information classified based on its level of sensitivity?
24
Data Handling10Are encryption mechanisms maintained for sensitive [Your company] data both in transit and at rest? Please describe.
25
11Is [Your company] Data sent or received via physical media?
26
12Is all media containing [Your company] systems and data securely disposed of to prevent recovery?
27
13Is data segmentation and separation capability between clients provided?
28
14Are backups of [Your company] Systems and Data performed? What is the retention period?
29
14.1Are backups stored onsite or offsite?
30
14.1.1For offsite, please provide the name of the subcontractor used.
31
14.1.2For offsite, do you have a contract in place with the subcontractor?
32
Human Resource Security15Are background checks performed for all employees and third parties?
33
16Is there a disciplinary process for non-compliance to security policies, does it include termination or change of status process?
34
17Is security awareness training provided to all employees at new hire and every year thereafter?
35
Physical Security18Is there a physical security program? Please provide details.
36
19Are physical security and environmental controls in place at the data center and office buildings?
37
20Is there a visitor access process or procedure to allow visitors into the building?
38
21Are visitors required to sign in and their IDs checked prior to permitting them to the building?
39
22Are visitors required to be escorted at all times during their visit to the building?
40
23Are data centers, Main Distribution Frame closets (MDFs) and other sensitive areas marked appropriately and access limited to only authorized users?
41
Change Management24Is there an operational change management/change control program and process that has been approved by management, communicated to appropriate constituents and an owner to maintain and review the program?
42
24.1Please upload the document, if applicable and appropriate
43
25Is there a formal process to ensure clients are notified prior to changes being made which may impact their service?
44
Identity & Access Management26Are user's credentials unique and is strong authentication such as Multifactor (MFA) required for remote access or access to sensitive information? Please explain
45
27Do you enforce password (e.g., minimum length, age, history, complexity) and account lockout (e.g., lockout threshold, lockout duration) for all computing devices?
46
28Is there a process which allows [Your company] to specifically list who from the provider will have access to their [Your company] Systems and Data?
47
29Is there a process to de-provision users logical and physical access after employee termination?
48
30Are user accounts (applications, Operating systems, computing devices, networking devices, privilege accounts) reviewed at-least quarterly?
49
Infrastructure Security31Is there an anti-malware/Endpoint Security policy or program in place?
50
32Is there a vulnerability management policy or program in place? Are all assets in scope scanned and at what frequency? Please explain
51
33Are vulnerability scans performed on all internet-facing applications at least monthly and after significant changes?
52
34Are network and application penetration tests performed?
53
34.1What is the frequency?
54
35Is there a patch management process for applications, systems, devices? Describe the patch management process.
55
35.1Does the program define the timeline for patch deployment based on patch criticality?
56
36Are default hardened base images applied to all operating systems?
57
37Is there a threat management system in place? Please provide details.
58
38Is there a Data loss prevention system in place? Does it cover Email and network etc.? Please explain
59
39Is there an Intrusion detection and/or Intrusion Prevention system in place? Please name the tool.
60
40While connecting remotely to the company network, does the system require a company approved and authorized Virtual Private Network (VPN) tool to connect?
61
40.1Does the Virtual Private Network (VPN) tool require Multi Factor Authentication (MFA) for logging into the company network?
62
Secure Software Development41Do you maintain a formal Software Development Lifecycle (SDLC)?
63
42Are development, test, and staging environments separated?
64
43Are change control procedures required for all application changes to the production environment?
65
44Are [Your company] systems and data ever used in the development, test, or QA environments?
66
45Are code reviews conducted for all software builds?
67
46Are applications analyzed on a regular basis to determine their vulnerability against recent attacks?
68
47Are vulnerability scans and penetration tests conducted on all production builds?
69
48Are mobile applications developed for [Your company]?
70
Endpoint Security49For endpoints, are security configuration and hardening standards documented?
71
50For all endpoints, are sufficient details contained in Operating System and application logs to support incident investigation, including successful and failed login attempts and changes to sensitive configuration settings and files?
72
50.1Are these logs protected against modification, deletion, and/or inappropriate access?
73
51Are unauthorized external media devices (including mass storage devices) prohibited from connecting to the end points, servers and other computing devices?
74
52Are exceptions documented, approved by senior management, and logged for audit purposes?
75
53Is encryption required on authorized removable media?
76
Network Security54Are security and hardening standards maintained for network devices, including Firewalls, Switches, Routers and Wireless Access Points (baseline configuration, patching, passwords, access control)?
77
55Are logical and/or physical controls used to isolate critical and sensitive systems into network segments separate from network segments with less sensitive systems?
78
56Are Intrusion Detection/Prevention Systems employed in all sensitive network zones and wherever firewalls are implemented?
79
57Is information transmitted over public networks to the production infrastructure sent over cryptographically sound encrypted connections? (TLS, VPN, IPSEC, etc)?
80
Fourth Party Security58Do agreements with fourth parties who have access or potential access to [Your company] Data, address confidentiality, audit, security, and privacy, including but not limited to incident response, ongoing monitoring, data sharing and secure disposal of [Your company]?
81
59Is there a documented privacy policy or procedures for the protection of information transmitted, processed, or maintained on behalf of [Your company]?
82
Incident Response60Is there an Incident Response Program that has been approved by management and communicated to constituents?
83
61Is there a formal Incident Response Plan? Please provide details
84
61.1Please upload the document, if applicable and appropriate
85
62Is there a 24x7x365 staffed phone number available to [Your company] to report security incidents?
86
Business Continuity and Disaster Recovery63Are formal business continuity procedures developed and maintained?
87
64Is there a periodic (at least annual) review of your Business Continuity Program?
88
65Is there a formal, documented exercise and testing program in place?
89
66Are all suppliers of critical hardware, network services and facility services involved in annual continuity and recovery tests?
90
67Is there a formal Disaster recovery plan and is the plan reviewed and tested annually? Please provide details
91
68Are site failover tests performed at least annually?
92
69Do contracts with Critical Service Providers include a penalty or remediation clause for breach of availability and continuity SLAs?
93
70Is there sufficient redundancy capacity to ensure services are not impacted in multi-tenancy environments during peak usage and above?
94
Compliance71Are client audits and assessments permitted?
95
72Is there an internal audit, risk management, or compliance department, or similar management oversight unit with responsibility for assessing, identifying and tracking resolution of outstanding regulatory issues?
96
73Are there policies and procedures to ensure compliance with applicable legislative, regulatory and contractual requirements including intellectual property rights on business processes or information technology software products?
97
74Is there a records retention policy covering paper and electronic records, including email in support of applicable regulations, standards and contractual requirements?
98
99
100
101
102
103
104
105